{"api_version":"1","generated_at":"2026-04-23T06:21:31+00:00","cve":"CVE-2022-23133","urls":{"html":"https://cve.report/CVE-2022-23133","api":"https://cve.report/api/cve/CVE-2022-23133.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-23133","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-23133"},"summary":{"title":"CVE-2022-23133","description":"An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.","state":"PUBLIC","assigner":"security@zabbix.com","published_at":"2022-01-13 16:15:00","updated_at":"2023-11-07 03:44:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/","name":"FEDORA-2022-dfe346f53f","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: zabbix-5.0.19-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/","name":"FEDORA-2022-dfe346f53f","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: zabbix-5.0.19-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.zabbix.com/browse/ZBX-20388","name":"https://support.zabbix.com/browse/ZBX-20388","refsource":"MISC","tags":[],"title":"[ZBX-20388] Stored XSS in host groups configuration window in Zabbix Frontend (CVE-2022-23133) - ZABBIX SUPPORT","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/","name":"FEDORA-2022-1a667b0f90","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: zabbix-5.0.19-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/","name":"FEDORA-2022-1a667b0f90","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: zabbix-5.0.19-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-23133","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23133","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Zabbix wants to thank Hazem Osama for reporting this issue to us","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"23133","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"23133","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"23133","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"zabbix","cpe6":"6.0.0","cpe7":"alpha1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"23133","vulnerable":"1","versionEndIncluding":"5.0.18","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"zabbix","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"23133","vulnerable":"1","versionEndIncluding":"5.4.8","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"zabbix","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-23133","qid":"181920","title":"Debian Security Update for zabbix (CVE-2022-23133)"},{"cve":"CVE-2022-23133","qid":"282270","title":"Fedora Security Update for zabbix (FEDORA-2022-dfe346f53f)"},{"cve":"CVE-2022-23133","qid":"282277","title":"Fedora Security Update for zabbix (FEDORA-2022-1a667b0f90)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@zabbix.com","DATE_PUBLIC":"2021-12-08T14:30:00.000Z","ID":"CVE-2022-23133","STATE":"PUBLIC","TITLE":"Stored XSS in host groups configuration window in Zabbix Frontend"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Frontend","version":{"version_data":[{"version_affected":"=","version_name":"5.0.0 – 5.0.18","version_value":"5.0.0 – 5.0.18"},{"version_affected":"=","version_name":"5.4.0 – 5.4.8","version_value":"5.4.0 – 5.4.8"},{"version_affected":"!>=","version_name":"5.0.19","version_value":"5.0.19"},{"version_affected":"!>=","version_name":"5.4.9","version_value":"5.4.9"}]}}]},"vendor_name":"Zabbix"}]}},"credit":[{"lang":"eng","value":"Zabbix wants to thank Hazem Osama for reporting this issue to us"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://support.zabbix.com/browse/ZBX-20388","name":"https://support.zabbix.com/browse/ZBX-20388"},{"refsource":"FEDORA","name":"FEDORA-2022-dfe346f53f","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"},{"refsource":"FEDORA","name":"FEDORA-2022-1a667b0f90","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"}]},"solution":[{"lang":"eng","value":"To remediate this vulnerability, apply the updates."}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-01-13 16:15:00","lastModifiedDate":"2023-11-07 03:44:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.0","versionEndIncluding":"5.4.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:zabbix:6.0.0:alpha1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.18","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"23133","Ordinal":"225745","Title":"CVE-2022-23133","CVE":"CVE-2022-23133","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"23133","Ordinal":"1","NoteData":"An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.","Type":"Description","Title":null},{"CveYear":"2022","CveId":"23133","Ordinal":"2","NoteData":"2022-01-13","Type":"Other","Title":"Published"},{"CveYear":"2022","CveId":"23133","Ordinal":"3","NoteData":"2022-01-22","Type":"Other","Title":"Modified"}]}}}